Description
Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2571-1 | libproxy security update |
EUVD |
EUVD-2012-4434 | Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504. |
Ubuntu USN |
USN-1629-1 | libproxy vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T20:35:09.950Z
Reserved: 2012-08-21T00:00:00.000Z
Link: CVE-2012-4505
No data.
Status : Modified
Published: 2012-11-11T13:00:49.963
Modified: 2026-04-29T01:13:23.040
Link: CVE-2012-4505
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN